Nemty Ransomware Keeping Non-Paying Victim's Data Until Paid

Nemty Ransomware Keeping Non-Paying Victim's Data Until Paid

The Nemty Ransomware has showed plans to create a blog that will be used to publish stolen data for ransomware victims who won’t to pay the ransom.

These tactics have alreadywill been employed buy Maze and now Sodinokibi.

They act by stealing files from companies before encrypting them. If a victim refuses to pay the ransom, then the stolen data will be leaked bit-by-bit until payment has been made.

Advertisement

Nemty are going to create leaked data site
The idea behind this malicious tactic is that companies may be more prone to pay a ransom if it costs less than the data breach costs, loss of trade and business secrets, brand image damage, and potential lawsuits for the disclosing of personal data.They are going to create a website to share this ‘news’. Currently there is a Nemty Ransomware affiliate panel, the ransomware developers have a news feed where they post their plans, bug fixes, and upcoming changes coming to their ransomware-as-a-service.

ransomware3
Also see: 10 Steps to Better Ransomware Protection

Nemty is already configured for network attacks with a builder mode that is used to create executables that target an entire network rather than individual computers.

In this mode, the created ransomware executables are "only for corporations". This means there will be one key used to decrypt all the devices in the network and victims will not be able to decrypt individual machines.

With this functionality in place, developing the RaaS to incorporate data exfiltration and further extortion tactics doesn’t seem like a tedious job.

Advertisement
MacMall Deal of the Day

This type of ransomware attack is a new method and it’s certainly pretty brazen. The devastation it may cause is unknown, but you can be sure to see more of this type of attack in the near future.

Unfortunately it’s not just the corporate data at risk but personal information too.

When cyberandtech.com find out more information about this new ransomware method and we will let you know in our future articles.

Have something to say about this article? Comment below or share it with us on Facebook, Twitter or LinkedIn.

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.

back to top

Popular Cyber News

Microsoft Azure security flaws revealed

Microsoft Azure security flaws revealed

03 February, 2020

Microsoft has patched two major flaws in its Azure cloud offering that could have allowed criminals to take full control...

Mobile Banking Users At Risk in SMS Phishing Campaign

Mobile Banking Users At Risk in SMS Phishing Campaign

18 February, 2020

Cybercriminals targeted mobile banking users by sending malicious SMS messages to their smartphones as part of a phishin...

Americans Want to Protect Their Information, but Don't Know How

Americans Want to Protect Their Information, but Don't Know How

08 February, 2020

Americans are keen on security, but do not necessarily understand it. This is the conclusion of a new survey of 1,300 Am...

Macs are more vulnerable to malware than PCs

Macs are more vulnerable to malware than PCs

12 February, 2020

Malware targeting Apple's Mac devices is growing at a faster rate than ever before, a new report by Malwarebytes is sugg...

Why Penetration Tests Are Absolutely Essential

Why Penetration Tests Are Absolutely Essential

03 February, 2020

Corporate network security breaches, which can prove costly to remediate and expose a company to lawsuits, are frequentl...

Top benefits of cloud computing

Top benefits of cloud computing

04 February, 2020

Gone are the days of the local server. Sure you may still have one as a backup. You may even have rooms filled with loca...

×

Sign up to keep in touch!

Be the first to hear the latest Cyber and Tech News straight to your mailbox.

Check out our Privacy Policy & Terms of use
You can unsubscribe from email list at any time